<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE ep-patent-document PUBLIC "-//EPO//EP PATENT DOCUMENT 1.1//EN" "ep-patent-document-v1-1.dtd">
<ep-patent-document id="EP01997780B1" file="EP01997780NWB1.xml" lang="en" country="EP" doc-number="1340192" kind="B1" date-publ="20050427" status="n" dtd-version="ep-patent-document-v1-1">
<SDOBI lang="en"><B000><eptags><B001EP>ATBECHDEDKESFRGBGRITLILUNLSEMCPTIESILTLVFIROMKCYALTR............................</B001EP><B003EP>*</B003EP><B005EP>J</B005EP><B007EP>DIM350 (Ver 2.1 Jan 2001)
 2100000/0</B007EP></eptags></B000><B100><B110>1340192</B110><B120><B121>EUROPEAN PATENT SPECIFICATION</B121></B120><B130>B1</B130><B140><date>20050427</date></B140><B190>EP</B190></B100><B200><B210>01997780.0</B210><B220><date>20011121</date></B220><B240><B241><date>20030623</date></B241></B240><B250>en</B250><B251EP>en</B251EP><B260>en</B260></B200><B300><B310>252600 P</B310><B320><date>20001122</date></B320><B330><ctry>US</ctry></B330></B300><B400><B405><date>20050427</date><bnum>200517</bnum></B405><B430><date>20030903</date><bnum>200336</bnum></B430><B450><date>20050427</date><bnum>200517</bnum></B450><B452EP><date>20041025</date></B452EP></B400><B500><B510><B516>7</B516><B511> 7G 06T   1/00   A</B511></B510><B540><B541>de</B541><B542>BILDERVERSTECKEN IN HALBTONBILDERN</B542><B541>en</B541><B542>HIDING IMAGES IN HALFTONE PICTURES</B542><B541>fr</B541><B542>MASQUAGE D'IMAGES DANS DES PHOTOGRAPHIES TRAMEES</B542></B540><B560><B561><text>US-A- 5 734 752</text></B561><B561><text>US-A- 5 790 703</text></B561><B561><text>US-A- 6 088 123</text></B561><B562><text>BAHARAV Z ET AL: "WATERMARKING OF DITHER HALFTONED IMAGES" PROCEEDINGS OF THE SPIE, SPIE, BELLINGHAM, VA, US, vol. 3657, 25 January 1999 (1999-01-25), pages 307-316, XP000949151</text></B562></B560></B500><B700><B720><B721><snm>ROSEN, Joseph</snm><adr><str>17 Halivne Street</str><city>84965 Omer</city><ctry>IL</ctry></adr></B721></B720><B730><B731><snm>Concealogram Ltd.</snm><iid>04649770</iid><irf>E3565.03</irf><adr><str>11 H'aamal St.,</str><city>Rosh H'aain 42098</city><ctry>IL</ctry></adr></B731></B730><B740><B741><snm>Thomson, Paul Anthony</snm><iid>00036701</iid><adr><str>Potts, Kerr &amp; Co.
15, Hamilton Square</str><city>Birkenhead
Merseyside CH41 6BR</city><ctry>GB</ctry></adr></B741></B740></B700><B800><B840><ctry>AT</ctry><ctry>BE</ctry><ctry>CH</ctry><ctry>CY</ctry><ctry>DE</ctry><ctry>DK</ctry><ctry>ES</ctry><ctry>FI</ctry><ctry>FR</ctry><ctry>GB</ctry><ctry>GR</ctry><ctry>IE</ctry><ctry>IT</ctry><ctry>LI</ctry><ctry>LU</ctry><ctry>MC</ctry><ctry>NL</ctry><ctry>PT</ctry><ctry>SE</ctry><ctry>TR</ctry></B840><B860><B861><dnum><anum>IB2001002194</anum></dnum><date>20011121</date></B861><B862>en</B862></B860><B870><B871><dnum><pnum>WO2002043000</pnum></dnum><date>20020530</date><bnum>200222</bnum></B871></B870><B880><date>20020725</date><bnum>000000</bnum></B880></B800></SDOBI><!-- EPO <DP n="1"> -->
<description id="desc" lang="en">
<heading id="h0001"><b>FIELD OF THE INVENTION</b></heading>
<p id="p0001" num="0001">The present invention is generally in the field of encryption/decryption techniques and relates to a method and device for hiding one pattern within the other. The invention is particularly useful for items' identification and authentication.</p>
<heading id="h0002"><b>BACKGROUND OF THE INVENTION</b></heading>
<p id="p0002" num="0002">Various techniques of hiding one image within the other, visible image have been developed. U.S. Patent No. 5,710,636 discloses a technique based on distributing pixels of an image to be hidden in between the pixels of a visible image, such that the hidden image can be identified by significant enlargement of the visible image. According to the techniques disclosed in U.S. Patents Nos. 4,627,819 and 4,889,367, physical filtering means are used to separate between the hidden and visible images. This is implemented by using different recording materials to record the hidden image within the visible image, and using different kinds of incident radiation to read these images.</p>
<p id="p0003" num="0003">Another techniques of the kind specified utilize halftone coding methods. According to the technique disclosed in U.S. Patents Nos. 5,329,108 and 5,416,312, the halftone dots (bits) of an image to be hidden are encoded and located within a predetermined area of a visible image. This predetermined area is selected as a background area of the visible image. U.S. Patent No. 5,315,098 discloses a technique for encoding digital data in the angular orientation of circularly asymmetric halftone dot patterns that are written into the halftone cells of digital halftone images. According to this technique, each<!-- EPO <DP n="2"> --> of the cells of digital data representative of a visible image is modified to encode the corresponding halftone dot of an image, which is to be hidden.</p>
<p id="p0004" num="0004">Halftone coding is a common method of representing continuous-tone images by binary values. As known [O. Bryngdahl et al., "Digital halftoning: synthesis of binary images," in <i>Progress In Optics,</i> E. Wolf, ed. North-Holland, Amsterdam, 1994, Vol. 33, pp. 389-463], according to the halftone binarization technique, various tone levels are translated to the area of binary dots. This method, known as binarization by a carrier [D. Kermisch and P. G. Roetling, "Fourier spectrum of halftone images," J. Opt Soc. Am. A 65, 716-723 (1975)], is related to the pulse-width modulation in communication theory.</p>
<heading id="h0003"><b>SUMMARY OF THE INVENTION</b></heading>
<p id="p0005" num="0005">There is a need in the art to facilitate hiding of one pattern within the visual representation of the other, to thereby facilitate items' identification or authentication, by providing a novel method and device for encoding visual information (pattern) in a halftone picture.</p>
<p id="p0006" num="0006">The main idea of the present invention is associated with the following. The gray level pixels of a visual picture are transformed into halftone dots in a halftone picture. Each gray-level pixel is transformed into a cell of white dots on a black background where their number (area occupied by these dots) represents the gray level. The dots' locations inside their cells usually do not represent any information. This non-uniformity (randomness) in the dots' positions from cell to cell is actually used to reduce the difference between the original gray-tone image and the resultant binary image as viewed by a detection system. According to the present invention, the dots' distribution within each cell of the halftone picture of a first visible pattern is encoded in accordance with the gray levels of the entire second pattern, which is to be hidden.</p>
<p id="p0007" num="0007">Thus, the present invention provides for utilizing a selected key function for creating a binary halftone representation of a first visible pattern carrying at<!-- EPO <DP n="3"> --> least one second hidden pattern which can be extracted out of the halftone picture by a specific processing (correlation). To create such halftone representation, a combination of two independent modulations is used. One such modulation is based on the principles of pulse-width modulation and consists of modulating the dots' area in the picture, a so-called dot-area modulation (DAM). The other modulation utilizes the principles of pulse-position modulation and consists of modulating the dots' position within their cells, a so-called dot-position modulation (DPM). In communication theory, the pulse-position modulation is known as an information representing method similar to the pulse-width modulation. More specifically, the halftone picture is created by binarization of a complex gray-tone function representative of the first pattern in the following manner: embedding the phase function of the complex function in the halftone picture by DPM, while encoding the magnitude of the complex function by DAM.</p>
<p id="p0008" num="0008">It should be understood that a halftone picture is typically a 2-D matrix of cells, each being characterized by a corresponding gray-tone level. Each such cell is, in turn, a 2-D matrix of halftone dots, whose number is representative of the respective gray-tone level. The present invention allows for modifying the halftone dots' distribution within their cells (i.e., the relative position of the dots' area within the cell) in the halftone picture of the first visible pattern, such that each cell carries information about the gray-tone levels of the at least one entire second pattern (hidden).</p>
<p id="p0009" num="0009">According to the invention, the binary halftone representation of the first visible pattern is such that, in each cell thereof, the magnitude of the binary function is representative of the corresponding gray-tone level of the first pattern and the halftone dots' position is representative of the gray-level distribution in the at least one second pattern. Hence, such a halftone picture representation of the first pattern should be found that, when being correlated with a predetermined reference function, yields the hidden output image. This reference function is related to the key function by spatial transformation. The<!-- EPO <DP n="4"> --> visible first pattern is used as the constraint on the input function (halftone picture). This means that, instead of a meaningless pattern of binary dots in the input, the halftone picture presents the first pattern. To achieve this, a matching condition between the first and second patterns is defined, which corresponds to the best transformation (correlation) between the first and second patterns, and an optimized function of the variable transformation characteristic (phase function) is determined. This variable transformation characteristic is the characteristic of the first pattern, namely, a phase function of the complex function of the first pattern In other words, when the first pattern is described by a complex function based on said optimized transformation characteristic, the matching condition is satisfied. This means that the correlation between the first pattern and the reference function results in the second pattern.</p>
<p id="p0010" num="0010">It is important to note that the above two modulations DAM and DPM are independent from each other, which allows using these techniques for encoding different images in the same halftone picture. However, the DPM-encoded image cannot be viewed directly by simply observing the halftone picture, but is rather hidden in the halftone picture, requiring a specific means to reveal this hidden image. To hide a single pattern within the binary halftone representation of another visible patter, the dots within each cell are shifted along one axis only. If two different patterns are to be hidden within the binary halftone representation of the visible pattern, the dots are shifted along two mutually perpendicular axes.</p>
<p id="p0011" num="0011">The above property enables to use the technique of the present invention in information security and encryption applications. Generally, the technique of the present invention provides for creating a pictured dot code. This code, on the one hand, is a collection of dots used as a secret code, which can be deciphered only by a special key, and, on the other hand, unlike other known codes (e.g., bar code), is a picture in the sense that the code itself is a meaningful image encoded by DAM independently of the hidden image encoded by DPM.<!-- EPO <DP n="5"> --></p>
<p id="p0012" num="0012">The present invention can also be used for embedding steganographic information in halftone pictures. The ordinary visible image is conventionally encoded by DAM, whereas the steganographic image is encoded by DPM. This can be utilized in identification cards. In this case, a special halftone photograph of a person on an identification card can show the card owner's picture as usual, while the same photograph includes confidential data, such as an image of the person's signature, his/her fingerprint, or some other personal records. The card holder must thus be matched to both types of image and to all the rest of the data on the card. Hence, counterfeiting of identification cards by a person who resembles the authentic person, or switching of the photographs on their identification cards, without being discovered becomes much more difficult. The steganographic images are revealed by a special key in particular processors.</p>
<p id="p0013" num="0013">There is thus provided according one broad aspect of the present invention, a method as implemented on an encoding device for hiding within a visible representation of a first pattern, at least one second pattern, the method comprising the steps of:
<ul id="ul0001" list-style="none" compact="compact">
<li>(i) selecting a predetermined key function;</li>
<li>(ii) utilizing said key function to create a binary halftone representation of the first pattern, in which the first pattern is visible and the at least one second pattern is hidden, each cell in said binary halftone representation having halftone dots' position distribution corresponding to gray-level distribution of the at least one second pattern, thereby enabling processing of said binary halftone representation by a two-dimensional spatial correlator based on the key function to extract data representative of the at least one second hidden pattern.</li>
</ul></p>
<p id="p0014" num="0014">According to another broad aspect of the invention, there is provided an encoding device comprising an interface utility for entering input data, and a data processing and analyzing utility, which is responsive to the input data<!-- EPO <DP n="6"> --> including first and second complex functions representative of first and second patterns, respectively, and a key function, to create a binary halftone representation of the first pattern, in which the first pattern is visible and the second pattern is hidden, and in which each cell has halftone dots' position distribution corresponding to gray-level distribution of the second pattern.</p>
<p id="p0015" num="0015">According to yet another aspect of the invention, there is provided a decoding device for use in extracting a hidden pattern contained in a binary halftone representation of another visible pattern created by the above-described method. The decoding device comprises a two-dimensional spatial correlator for processing input data representative of the binary halftone representation with a spatial filter in the form of said key function, such that the hidden image is obtained in an output plane of the correlator as a correlation function between the binary halftone representation displayed in an input plane of said correlator and a predetermined reference function related to said key function by a spatial transformation.</p>
<p id="p0016" num="0016">The 2-D correlator may be implemented digitally (software) or as optical assembly.</p>
<p id="p0017" num="0017">The present invention, according to yet another aspects thereof, provides an item carrying the above-described binary halftone representation; and an item identification system utilizing the above-described decoding device.</p>
<heading id="h0004"><b>BRIEF DESCRIPTION OF THE DRAWINGS</b></heading>
<p id="p0018" num="0018">In order to understand the invention and to see how it may be carried out in practice, a preferred embodiment will now be described, by way of non-limiting example only, with reference to the accompanying drawings, in which:
<ul id="ul0002" list-style="none" compact="compact">
<li><b>Figs. 1A and 1B</b> illustrate the main components of encryption and decryption units, respectively, for use in a system of the present invention;<!-- EPO <DP n="7"> --></li>
<li><b>Figs. 2A</b> to <b>2E</b> show five different examples, respectively, of a technique according to the invention for hiding one pattern (image) within the other;</li>
<li><b>Figs. 3A and 3B</b> exemplify a flow chart of the a method of the present invention;</li>
<li><b>Fig. 4</b> is a flow chart more specifically illustrating the main steps in the method stage of Fig. 3A consisting of determining a matching condition between a first visible pattern and a second hidden pattern;</li>
<li><b>Fig. 5A</b> illustrate the principles of the method stage of Fig. 3A consisting of creation of a binary halftone representation (picture) of the first visible pattern with the second pattern hidden therein based on dot-position modulation;</li>
<li><b>Fig. 5B</b> illustrates the spatial spectrum of a typical binary halftone picture;</li>
<li><b>Fig. 6</b> illustrates an optical assembly suitable for processing the halftone picture to decrypt it thereby enabling identification of the hidden pattern;</li>
<li><b>Figs. 7A and 7B</b> exemplify an enlarged region of the halftone picture with and without dot-position modulation, respectively;</li>
<li><b>Figs. 8A-8E and 9A-9E</b> show experimental results illustrating advantageous features of the present invention;</li>
<li><b>Fig. 10</b> presents another experimental results illustrating some more advantageous features of the present invention;</li>
<li><b>Figs. 11A</b> and <b>11B</b> exemplify a particular application of the technique of the present invention where a bar code is hidden within an item advertisement image (visible pattern); and</li>
<li><b>Fig. 12</b> illustrates how the present invention can be used for authentication purposes.</li>
</ul><!-- EPO <DP n="8"> --></p>
<heading id="h0005"><b>DETAILED DESCRIPTION OF THE INVENTION</b></heading>
<p id="p0019" num="0019"><b>Figs. 1A</b> and <b>1B</b> illustrate, respectively, an encryption unit 2 and a decryption unit <b>4,</b> for use in a system according to the invention. The only common data utilized in these units is a predetermined key function <b>KF</b>. The key function is a randomly selected function generated by a computer to become an unchangeable part of a digital correlator used for encryption, and a similar correlator (not necessarily fully digital) used for decryption purposes, as will be described below.</p>
<p id="p0020" num="0020">The encryption unit <b>2</b> is typically a computer device comprising an interface utility (not shown) for entering input data and preprogrammed with a predetermined data processing and analyzing utility 6 (software), which is capable of carrying out a method of the present invention. This software receives input data <b>ID</b> indicative of two functions representing first and second patterns, respectively, and of the key function; and processes the input data to obtain output data <b>OD</b> in the form of an encoded halftone picture <b>HP</b> of the first pattern, in which the first pattern is visible and the second pattern is hidden.</p>
<p id="p0021" num="0021">The decryption unit <b>4</b> is composed of a data-reading utility 8 (e.g., an optical scanner) and a processor <b>9</b>. The data-reading utility is applied to the halftone picture <b>HP</b> to generate output data indicative thereof, which is processed by the processor <b>9</b> to extract data representative of the hidden pattern. It should be understood that, if the optical scanner is used as the data-reading utility, a print version of the halftone picture is considered. The processor may be a digital processor (software) or an additional optical assembly (correlator), as will be described further below.</p>
<p id="p0022" num="0022">Referring to <b>Figs. 2A-2E</b>, the essence of the present invention is illustrated in five different examples, respectively The main issue of the invention is to create a halftone picture <b>10</b> (halftone representation) of a first pattern <b>12</b> (a gray-tone image), so as to include therein a second pattern <b>14</b><!-- EPO <DP n="9"> --> (e.g., binary image), such that the first and second patterns are, respectively, visible and hidden in the halftone picture <b>10</b>.</p>
<p id="p0023" num="0023">In the present examples, five pairs of visible and hidden pictures <b>12</b> and <b>14</b> were used. Originally, the visible patterns <b>12</b> were gray-tone images of the size of 128 x 128 pixels, and the hidden patterns <b>14</b> were binary images of various sizes smaller than that of the gray-tone images. The halftone pictures <b>10</b> are obtained by both DAM and DPM techniques, such that every part of the hidden image <b>14</b> is concealed globally in all the points of the halftone picture <b>10</b>. In other words, each cell of the halftone picture <b>10</b> has appropriate halftone dots' positions indicative of the gray-levels of the entire hidden pattern <b>14</b>. An additional processing (decryption) of the halftone picture <b>10</b> enables obtaining an extracted hidden pattern <b>16.</b> As shown in the figures, the halftone pictures <b>10</b> enable viewing of the corresponding gray-tone images <b>12,</b> and the extracted hidden images <b>16</b> are recognizable as well.</p>
<p id="p0024" num="0024">It should be noted that, although binary representation of hidden images was chosen in the present examples, the technique of the present invention is not limited to this selection, and gray-tone representation of hidden images can be used as well. However, as seen in the figures, the extracted hidden images 16 are accompanied by a certain level of noise. This noise level naturally becomes more meaningful and destructive for gray-tone images. It should also be noted, although not specifically illustrated, that one more pattern (in addition to pattern <b>14</b>) may be hidden within the halftone representation <b>10</b> of the visible pattern <b>12</b>.</p>
<p id="p0025" num="0025">The halftone coding method utilizes digital processing of the gray-tone images (digital correlator). In the present examples of Figs. 2A-2E, the decryption technique (extraction of the hidden image from the halftone picture) also utilized a digital correlator. It should, however, be noted and will be described in details below, that other means could be used for decryption purposes.<!-- EPO <DP n="10"> --></p>
<p id="p0026" num="0026">As indicated above, the creation of the halftone picture <b>10</b>, namely, encoding or encryption technique, utilizes DAM and DPM applied to the first pattern <b>12</b>, which is to be visible in the halftone picture <b>10</b>. The main steps of the halftone picture creation method according to an example of the invention, as well as those of the hidden image extraction, will now be described with reference to <b>Figs. 3A and 3B</b>.</p>
<p id="p0027" num="0027">Initially, first and second patterns (to be, respectively, visible and hidden in the halftone picture) are given by two analog (gray-level) functions <i>f(x</i>,<i>y)</i> and <i>a(ξ</i>,<i>η)</i>, which are independent of each other. The functions <i>f(x</i>,<i>y)</i> and <i>a(ξ</i>,<i>η)</i> are defined in different coordinate systems, because they are observed in two different planes, i.e., the input and output planes of a correlator. Since the first and second functions <i>f(x</i>,<i>y)</i> and <i>a(ξ</i>,<i>η)</i> represent gray-tone patterns, both functions are real and positive.</p>
<p id="p0028" num="0028">For the purposes of halftone picture creation, the first and second functions <i>f(x</i>,<i>y)</i> and <i>a(ξ</i>,<i>η)</i> are described as the magnitude of the complex functions:<maths id="math0001" num=""><math display="block"><mrow><mtext mathvariant="italic">g</mtext><mtext>(</mtext><mtext mathvariant="italic">x</mtext><mtext>,</mtext><mtext mathvariant="italic">y</mtext><mtext>) = </mtext><mtext mathvariant="italic">f</mtext><mtext>(</mtext><mtext mathvariant="italic">x</mtext><mtext>,</mtext><mtext mathvariant="italic">y</mtext><mtext>)exp[</mtext><mtext mathvariant="italic">i</mtext><mtext>θ(</mtext><mtext mathvariant="italic">x</mtext><mtext>,</mtext><mtext mathvariant="italic">y</mtext><mtext>)]</mtext></mrow></math><img id="ib0001" file="imgb0001.tif" wi="50" he="5" img-content="math" img-format="tif"/></maths><maths id="math0002" num=""><math display="block"><mrow><mtext mathvariant="italic">c(ξ</mtext><mtext>,</mtext><mtext mathvariant="italic">η)</mtext><mtext> = </mtext><mtext mathvariant="italic">a(</mtext><mtext>ξ,η</mtext><mtext mathvariant="italic">)</mtext><mtext>exp[</mtext><mtext mathvariant="italic">i</mtext><mtext>ψ(ξ,η)]</mtext></mrow></math><img id="ib0002" file="imgb0002.tif" wi="49" he="5" img-content="math" img-format="tif"/></maths> wherein <i>exp[iθ(x</i>,<i>y)]</i> and <i>exp[iψ( ξ</i>, <i>η)]</i> are phase functions, each defining an additional "degree of freedom" for an image. The phase function exp[<i>i</i>θ(<i>x</i>,<i>y</i>)] presents a variable characteristic of a transformation process used in the halftone picture creation, and an optimal solution θ(<i>x</i>,<i>y</i>) of this phase function is to be found, the purposes of which is described below</p>
<heading id="h0006"><i>Step I</i></heading>
<p id="p0029" num="0029">Provided at the first step, is a key function <i>H(u,v)</i>, which is a phase-only function (for the purposes explained below) and which is used for both halftone picture creation (encryption) and extraction of the hidden image (decryption). The key function is a random function generated by a random-number computer generator. It should be noted that the key function <i>H(u,v)</i> is chosen only once at the starting point of the method, and becomes an unchangeable<!-- EPO <DP n="11"> --> part of the correlator. Moreover, <i>H</i>(<i>u</i>,<i>v</i>) is not in any way related to any of the encoded images and is not any land of a system memory. Therefore <i>H</i>(<i>u</i>, <i>v)</i> does not limit the quantity of image pairs that can be revealed by the same key function.</p>
<heading id="h0007"><i>Step II</i></heading>
<p id="p0030" num="0030">At the second step, the key function is utilized <i>H(u, v)</i> to create a binary halftone representation of a first pattern, in which the first pattern is visible and a second pattern is hidden. The halftone picture is such that each cell therein has halftone dots' positions corresponding to the gray-level distribution of the second pattern. By processing such a binary halftone representation by a two-dimensional spatial correlator based on the key function, data representative of the second hidden pattern can be extracted. The halftone synthesis technique of the present invention actually presents a generalization of the Fresnel computer-generated hologram synthesis. In the hologram synthesis analogy, the key function <i>H</i>(<i>u</i>,<i>v</i>) acts as a generalized medium between the halftone picture and the reconstructed hidden image, in a fashion similar to that in which the quadratic phase factor represents the free-space medium in the reconstruction of a Fresnel hologram [O. Bryngdahl and F. Wyrowski, "Digital holography computer-generated holograms," in Progress In Optics, E. Wolf, ed. (North-Holland, Amsterdam, 1990), Vol. 28, pp. 1-86]. The function of the medium can be that of a key to expose an image, but the medium does not contain any information about the image and therefore its size does not limit the image capacity that can be utilized by the system.</p>
<p id="p0031" num="0031">The main operational stages in the halftone picture creation step (step II) will now be described:</p>
<heading id="h0008"><i>First operational stage</i></heading>
<p id="p0032" num="0032">At the first operational stage, all three functions <i>g(x,y)</i>, <i>c(ξ,η)</i> and <i>H(u,v)</i> are used to define a matching condition between the first and second patterns <i>g(x,y)</i> and <i>c(ξ,η)</i>, and to determine the optimal solution <i>θ(x,y)</i> for the phase function <i>exp</i>[<i>iθ</i>(<i>x</i>,<i>y</i>)]. The matching condition actually presents a condition of<!-- EPO <DP n="12"> --> the best transformation of one pattern into the other, such that, when the matching condition is satisfied, each cell in the halftone representation of the first pattern is indicative of the entire second pattern, as will be explained in details further below. The argument function <i>θ</i>(<i>x</i>,<i>y</i>) of the phase function presents a variable transformation parameter, which when being appropriately selected, provides for said matching condition.</p>
<p id="p0033" num="0033">To determine the argument function <i>θ</i>(<i>x</i>,<i>y</i>), the predefined transformation function is sequentially optimized by carrying out a sequence of iterations thereof until getting the optimal θ(x,y). This technique will be described more specifically below with reference to Fig. 4.</p>
<heading id="h0009"><i>Second operation stage</i></heading>
<p id="p0034" num="0034">At the second operational stage of the invented method, a binary halftone representation <i>b</i>(<i>x</i>, <i>y</i>) of the first pattern <i>f</i>(<i>x</i>, <i>y</i>) is obtained, in which the halftone dots' positions within each cell are encoded in accordance with the gray-level distribution within the entire second pattern. Generally, digital data representative of the first pattern can be obtained separately by DAM and then modified by DPM to obtain the binary halftone representation <i>b(x,y)</i>. Preferably, however, these two processes are applied concurrently to the first pattern <i>f(x,y)</i>, while creating the binary halftone picture <i>b(x,y)</i> thereof.</p>
<heading id="h0010"><i>Extraction of hidden image</i></heading>
<p id="p0035" num="0035">The so-obtained halftone picture <i>b(x,y)</i> enables revealing of the hidden pattern <i>a(ξ, η)</i> in the output plane of the correlator (either digital or optical) from the halftone picture <i>b(x,y)</i> located in the input plane of the correlator, by utilizing the key function <i>H(u</i>,<i>v)</i>, namely, the complex conjugate thereof <i>H</i>*=(<i>u</i>,<i>v</i>). This is implemented by using a 2-D spatial correlator, the key function <i>H(u,v)</i> being the spatial filter of this correlator, thereby enabling the hidden pattern to appear on the output plane of the correlator when the halftone picture is displayed on its input plane. In the present example, the correlator is of the kind based on a 2-D Fourier transform (FT) and inverse Fourier transform (IFT). Hence, the hidden pattern is to be obtained as the correlation function<!-- EPO <DP n="13"> --> between the halftone picture and a reference function, which is related to the spatial filter function <i>H</i>(<i>u</i>,<i>v</i>) by a 2-D Fourier transform (FT).</p>
<p id="p0036" num="0036">It should be understood that the optimized argument function <i>θ(x,y)</i> of the phase function <i>exp</i>[<i>iθ(x,y)</i>] is such that, when this phase function is multiplied by the visible pattern function <i>f(x</i>,<i>y</i>) and passes through the correlator, this results in a complex function with a magnitude equal to the hidden pattern <i>a(ξ</i>,<i>η)</i>. Therefore, two independent patterns <i>f(x</i>,<i>y</i>) and <i>a(ξ,η)</i> are obtained in, respectively, the input and output planes of the correlator. Both functions are the magnitudes of the two complex functions. According to the invention, the binary halftone representation of the first visible pattern is created by binarization of the complex gray-tone function <i>g</i>(<i>x</i>,<i>y</i>) representative of the first pattern in the following manner: embedding the phase function <i>exp</i>[<i>iθ</i>(<i>x</i>,<i>y</i>)] in the halftone picture by DPM, while encoding the first pattern <i>f</i>(<i>x</i>,<i>y</i>) by DAM.</p>
<p id="p0037" num="0037">The transformation process defining the matching condition is determined by the following. The key function <i>H(u</i>,<i>v)</i> is the filter function displayed on a spatial-frequency plane. The inverse Fourier transform (IFT) of the key function, and the complex conjugate of the key function are denoted, respectively, <i>h</i>(<i>x</i>,<i>y</i>) and <i>H*(u,v)</i>. For reasons of algorithm stability (as explained below), the key function <i>H(u,v)</i> is selected as being a phase-only function of the form:<maths id="math0003" num=""><math display="block"><mrow><mtext mathvariant="italic">H(u,v)</mtext><mtext> = </mtext><mtext mathvariant="italic">exp[iφ(u,v)]</mtext></mrow></math><img id="ib0003" file="imgb0003.tif" wi="38" he="5" img-content="math" img-format="tif"/></maths> wherein φ<i>(u</i>,<i>v)</i> is a random function generated by a random-number computer generator, and is uniformly distributed within the interval -π to π.</p>
<p id="p0038" num="0038">To enable encryption of the first pattern and decryption of the halftone picture thereof, the halftone picture to be created is such that, when correlated with a predetermined reference function <i>h*</i>(-<i>x</i>,-<i>y</i>), yields the hidden output pattern <i>a(ξ</i>,<i>η)</i>. Generally, the reference function <i>h*</i>(-<i>x</i>,-<i>y</i>) is related to the key function by spatial transformation, In this specific example of the invention, utilizing a two-dimensional Fourier transform, the function <i>h*</i>(-<i>x</i>,-<i>y</i>) is the<!-- EPO <DP n="14"> --> complex conjugate of the 180°-rotated function obtained as the inverse Fourier transform (IFT) of the key function. The visible pattern <i>f</i>(<i>x</i>,<i>y)</i> is used as the constraint on the input function (halftone picture). This means that, instead of a meaningless pattern of binary dots in the input, the halftone picture presents the pattern <i>f</i>(<i>x</i>,<i>y</i>).</p>
<p id="p0039" num="0039">Thus, the transformation used in the present invention to encode the halftone picture of the first pattern is in the form of a correlation between the complex function <i>g(x</i>,<i>y)</i> representative of the first visible pattern and the predetermined reference function <i>h*(-x</i>, <i>-y)</i>, that is:<maths id="math0004" num=""><math display="block"><mrow><mtext mathvariant="italic">c(ξ</mtext><mtext>,</mtext><mtext mathvariant="italic">η)</mtext><mtext>=g(</mtext><mtext mathvariant="italic">x</mtext><mtext>,</mtext><mtext mathvariant="italic">y) ⊗</mtext><mtext> h*(-x,-y)</mtext></mrow></math><img id="ib0004" file="imgb0004.tif" wi="47" he="5" img-content="math" img-format="tif"/></maths> wherein ⊗ denotes a correlation.</p>
<p id="p0040" num="0040">Thus, the complex function representing the output hidden pattern, <i>c(ξ</i>,<i>η)</i>, which is the result of the correlation, is as follows:<maths id="math0005" num=""><math display="block"><mrow><mtext mathvariant="italic">c</mtext><mtext>(</mtext><mtext mathvariant="italic">ξ</mtext><mtext>,</mtext><mtext mathvariant="italic">η</mtext><mtext>) = {</mtext><mtext mathvariant="italic">f</mtext><mtext>(</mtext><mtext mathvariant="italic">x</mtext><mtext>,</mtext><mtext mathvariant="italic">y</mtext><mtext>)exp[</mtext><mtext mathvariant="italic">iθ</mtext><mtext>(</mtext><mtext mathvariant="italic">x</mtext><mtext>,</mtext><mtext mathvariant="italic">y</mtext><mtext>]}</mtext><mtext mathvariant="italic">⊗h</mtext><mtext>*(-</mtext><mtext mathvariant="italic">x</mtext><mtext>,-</mtext><mtext mathvariant="italic">y</mtext><mtext>) = IFT{FT[</mtext><mtext mathvariant="italic">g</mtext><mtext>(</mtext><mtext mathvariant="italic">x</mtext><mtext>,</mtext><mtext mathvariant="italic">y</mtext><mtext>)exp[</mtext><mtext mathvariant="italic">i</mtext><mtext>φ(</mtext><mtext mathvariant="italic">u</mtext><mtext>,</mtext><mtext mathvariant="italic">v</mtext><mtext>)]}</mtext></mrow></math><img id="ib0005" file="imgb0005.tif" wi="127" he="5" img-content="math" img-format="tif"/></maths></p>
<p id="p0041" num="0041">Accordingly, the input function is given by:<maths id="math0006" num=""><img id="ib0006" file="imgb0006.tif" wi="122" he="20" img-content="math" img-format="tif"/></maths></p>
<p id="p0042" num="0042">Having defined the transformation, the optimal argument function <i>θ(x</i>,<i>y)</i> of the phase function <i>exp</i>[<i>iθ</i>(<i>x</i>,<i>y</i>)] (defining the matching condition) is to be determined. This is implemented by a sequence of iterations, as shown in Fig. 4.</p>
<p id="p0043" num="0043">The iterative algorithm, which is the projection-onto-constraint-sets (POCS) based algorithm, modified to operate with correlations [J. Rosen, "Learning in correlators based on projections onto constraint sets," Opt Lett.<!-- EPO <DP n="15"> --> 18, 1183-1185 (1993); Y Li, K. Kreske, and J. Rosen "Security and Encryption optical systems based on a correlator with significant output images", Applied Optics, <b>39</b>, pp. 5295-5301, 2000], starts with an initial random function <i>exp[iθ</i><sub><i>l</i></sub><i>(x</i>,<i>y)]</i>. The correlation process described in equation (1) is carried out: FT is applied to the function <i>g</i><sub><i>1</i></sub>(<i>x</i>,<i>y</i>)=<i>f(x,y)exp[iθ</i><sub><i>1</i></sub>(<i>x</i>,<i>y</i>)], the FT result is multiplied with the key function <i>H</i>(<i>u</i>,<i>v</i>)=<i>exp</i>[<i>iφ</i>(<i>u</i>,<i>v</i>)], and IFT is applied to the multiplication results.</p>
<p id="p0044" num="0044">The so-obtained function <i>c</i><sub><i>1</i></sub>(<i>ξ</i>,<i>η</i>)=|<i>c</i><sub><i>1</i></sub><i>(ξ, η)</i>| <i>exp</i>[<i>iψ</i>(<i>ξ</i>,<i>η</i>)] is processed by a projection operation denoted <b>P</b><sub><b>1</b></sub><b>.</b> This procedure consists of the following:</p>
<p id="p0045" num="0045">The constraint on the output plane is defined by the requirement to obtain the hidden image <i>a</i>(<i>ξ</i>,<i>η</i>). Therefore, in the output plane, projection <b>P</b><sub><b>1</b></sub> onto the constraint set at the <i>j</i>th iteration is as follows:<maths id="math0007" num=""><img id="ib0007" file="imgb0007.tif" wi="113" he="17" img-content="math" img-format="tif"/></maths> wherein <i>exp</i>[<i>iψ</i><sub><i>j</i></sub>(<i>ξ</i>,<i>η</i>)] is the phase function of the complex function <i>c</i><sub><i>j</i></sub>(<i>ξ</i>,<i>η</i>) in the <i>j</i>th iteration; and <i>W</i> is a window support of the hidden image. The window's area is smaller than or equal to the area of the output plane.</p>
<p id="p0046" num="0046">The function <i>a(ξ</i>,<i>η)exp</i>[<i>iψ</i><sub><i>j</i></sub>(<i>ξ</i>,η)] resulting from the above projection <b>P</b><sub><b>1</b></sub> now undergoes a processing similar to that initially applied to the function <i>g</i><sub><i>1</i></sub>(<i>x</i>,<i>y</i>), to thereby transform backward the function |<i>g</i><sub><i>j</i></sub>(<i>x</i>,<i>y</i>)|<i>exp</i>[<i>iθ</i><sub><i>j</i></sub>(<i>x</i>,<i>y</i>)]. To this end, the correlation described in equation (2) above is carried out: application of FT, multiplication of the FT results with the complex conjugate of the key function <i>H</i>*(<i>u</i>,<i>v</i>)=<i>exp</i>[-<i>i</i>φ(<i>u</i>,<i>v</i>)], and IFT of the results.</p>
<p id="p0047" num="0047">The so-obtained function |<i>g</i><sub><i>1</i></sub>(<i>x</i>,<i>y</i>)|<i>exp</i>[<i>iθ</i><sub><i>j</i></sub><i>(x</i>,<i>y</i>)] then undergoes a similar projection <b>P</b><sub><b>2</b></sub> onto the constraint set at the <i>j</i>th iteration in the input plane:<maths id="math0008" num="(4)"><math display="block"><mrow><msub><mrow><mtext mathvariant="italic">P</mtext></mrow><mrow><mtext>2</mtext></mrow></msub><mtext>[</mtext><msub><mrow><mtext mathvariant="italic">g</mtext></mrow><mrow><mtext mathvariant="italic">j</mtext></mrow></msub><mtext>(</mtext><mtext mathvariant="italic">x</mtext><mtext>,</mtext><mtext mathvariant="italic">y</mtext><mtext>)] = </mtext><mtext mathvariant="italic">f</mtext><mtext>(</mtext><mtext mathvariant="italic">x</mtext><mtext>,</mtext><mtext mathvariant="italic">y</mtext><mtext>)exp[</mtext><mtext mathvariant="italic">i</mtext><msub><mrow><mtext>θ</mtext></mrow><mrow><mtext mathvariant="italic">j</mtext></mrow></msub><mtext>(</mtext><mtext mathvariant="italic">x</mtext><mtext>,</mtext><mtext mathvariant="italic">y</mtext><mtext>)]</mtext></mrow></math><img id="ib0008" file="imgb0008.tif" wi="59" he="6" img-content="math" img-format="tif"/></maths><!-- EPO <DP n="16"> --> wherein <i>exp</i>[<i>iθj(x</i>,<i>y)</i>] is the phase function of <i>g</i><sub><i>j</i></sub>(<i>x</i>,<i>y</i>) at the jth iteration.</p>
<p id="p0048" num="0048">This process results in the first image function <i>f(x</i>,<i>y)exp[iθ</i><sub><i>j</i></sub><i>(x</i>,<i>y)</i>], wherein <i>exp</i>[<i>iθ</i><sub><i>j</i></sub>(<i>x</i>,<i>y</i>)] is an optimized phase function (variable characteristic of the transformation process).</p>
<p id="p0049" num="0049">Thus, at every iteration in each of the two domains, (<i>x</i>,<i>y</i>) and (ξ,η), the functions obtained are projected onto the constraint sets. In both domains, the constraint sets express the expectation of getting the predefined images <i>a</i>(ξ,η) at (ξ,η) and <i>f</i>(<i>x</i>,<i>y</i>) at (<i>x</i>,<i>y</i>). The algorithm continues to iterate between the two domains until the error between the actual and the desired image functions is no longer meaningfully reduced.</p>
<p id="p0050" num="0050">As indicated above, the key function <i>H(u,v)</i> is chosen only once before the iterations. This <i>H</i>(<i>u</i>,<i>v</i>) becomes part of the correlator, and it is never changed during the iteration process.</p>
<p id="p0051" num="0051">The first operational stage (aimed at determining the optimal solution for the phase function) is terminated in the <i>n</i>th iteration, when the correlation between <i>g</i><sub><i>n</i></sub><i>(x</i>,<i>y)</i> and <i>h*(-x</i>,<i>-y)</i> yields a complex function whose magnitude is close enough to the hidden image <i>a(ξ</i>,<i>η)</i> by means of a relatively small mean-square error. It should be understood that small error values depend on the nature of the given images <i>a(ξ</i>,<i>η)</i>, and <i>f(x</i>,<i>y)</i>.</p>
<p id="p0052" num="0052">The iteration process is terminated before the corresponding projection <b>P</b><sub><b>2</b></sub>, because in the next stage the function <i>g</i><sub><i>n</i></sub><i>(x</i>,<i>y)</i> is binarized, i.e., an operation that causes the output image to become only an approximation of the desired image (hidden image). If the iteration process is terminated after projection <b>P</b><sub><b>2</b></sub>, the error in image <i>a(ξ,η)</i> will be increased, because the magnitude of the correlation between <i>P</i><sub><i>2</i></sub><i>[g</i><sub><i>n</i></sub><i>(x</i>,<i>y)]</i> and h*(-<i>x</i>,-<i>y</i>) is only an approximation of <i>a(ξ,η</i>) and the binarization adds more error.</p>
<p id="p0053" num="0053">The iteration process never diverges. The convergence of the iteration process to the desired images in the <i>j</i>th iteration is evaluated by two average mean-square errors between the two complex functions, before and after the projections in the two domains. Since the phase functions are not changed by<!-- EPO <DP n="17"> --> the projections, the errors are the average mean square of the difference between magnitudes before and after the projections. The mean-square errors are as follows:<maths id="math0009" num=""><math display="block"><mrow><msub><mrow><mtext mathvariant="italic">e</mtext></mrow><mrow><mtext mathvariant="italic">cj</mtext></mrow></msub><mtext> = </mtext><mfrac><mrow><mtext>1</mtext></mrow><mrow><msubsup><mrow><mtext mathvariant="italic">M</mtext></mrow><mrow><mtext mathvariant="italic">W</mtext></mrow><mrow><mtext>2</mtext></mrow></msubsup></mrow></mfrac><mtext>∫∫</mtext><msup><mrow><mfenced open="|" close="|"><mrow><mtext mathvariant="italic">P</mtext><msub><mrow><mtext>​</mtext></mrow><mrow><mtext>1</mtext></mrow></msub><mtext>[</mtext><mtext mathvariant="italic">c</mtext><msub><mrow><mtext>​</mtext></mrow><mrow><mtext mathvariant="italic">j</mtext></mrow></msub><mtext>(ξ,η]-</mtext><mtext mathvariant="italic">c</mtext><msub><mrow><mtext>​</mtext></mrow><mrow><mtext mathvariant="italic">j</mtext></mrow></msub><mtext>(ξ,η)</mtext></mrow></mfenced></mrow><mrow><mtext>2</mtext></mrow></msup><mtext mathvariant="italic">d</mtext><mtext>ξ </mtext><mtext mathvariant="italic">dn</mtext><mspace linebreak="newline"/><mtext> = </mtext><mfrac><mrow><mtext>1</mtext></mrow><mrow><msubsup><mrow><mtext mathvariant="italic">M</mtext></mrow><mrow><mtext mathvariant="italic">W</mtext></mrow><mrow><mtext>2</mtext></mrow></msubsup></mrow></mfrac><mtext>∫∫</mtext><mfenced open="|" close="|"><mrow><mtext mathvariant="italic">a</mtext><mtext>(ξ,η)-</mtext></mrow></mfenced><msub><mrow><mtext mathvariant="italic">c</mtext></mrow><mrow><mtext mathvariant="italic">j</mtext></mrow></msub><msup><mrow><mtext>(ξ,η)∥</mtext></mrow><mrow><mtext>2</mtext></mrow></msup><mtext mathvariant="italic">d</mtext><mtext>ξ</mtext><mtext mathvariant="italic">dn</mtext><mtext>,</mtext></mrow></math><img id="ib0009" file="imgb0009.tif" wi="127" he="11" img-content="math" img-format="tif"/></maths><maths id="math0010" num="(5)"><math display="block"><mrow><msub><mrow><mtext mathvariant="italic">e</mtext></mrow><mrow><mtext mathvariant="italic">g</mtext></mrow></msub><msub><mrow><mtext>​</mtext></mrow><mrow><mtext mathvariant="italic">j</mtext></mrow></msub><mtext> = </mtext><mfrac><mrow><mtext>1</mtext></mrow><mrow><msup><mrow><mtext mathvariant="italic">M</mtext></mrow><mrow><mtext>2</mtext></mrow></msup></mrow></mfrac><mtext>∫∫</mtext><msup><mrow><mfenced open="|" close="|"><mrow><mtext mathvariant="italic">P</mtext><msub><mrow><mtext>​</mtext></mrow><mrow><mtext>2</mtext></mrow></msub><mtext>[</mtext><mtext mathvariant="italic">g</mtext><msub><mrow><mtext>​</mtext></mrow><mrow><mtext mathvariant="italic">j</mtext></mrow></msub><mtext>(</mtext><mtext mathvariant="italic">x</mtext><mtext>,</mtext><mtext mathvariant="italic">y</mtext><mtext>)]-</mtext><mtext mathvariant="italic">g</mtext><msub><mrow><mtext>​</mtext></mrow><mrow><mtext mathvariant="italic">j</mtext></mrow></msub><mtext>(</mtext><mtext mathvariant="italic">x</mtext><mtext>,</mtext><mtext mathvariant="italic">y</mtext><mtext>)</mtext></mrow></mfenced></mrow><mrow><mtext>2</mtext></mrow></msup><mtext> </mtext><mtext mathvariant="italic">dxdy</mtext><mspace linebreak="newline"/><mtext> = </mtext><mfrac><mrow><mtext>1</mtext></mrow><mrow><msup><mrow><mtext mathvariant="italic">M</mtext></mrow><mrow><mtext>2</mtext></mrow></msup></mrow></mfrac><mtext>∫∫</mtext><mfenced open="|" close="|"><mrow><mtext mathvariant="italic">f</mtext><mtext>(</mtext><mtext mathvariant="italic">x</mtext><mtext>,</mtext><mtext mathvariant="italic">y</mtext><mtext>)-</mtext></mrow></mfenced><msub><mrow><mtext mathvariant="italic">g</mtext></mrow><mrow><mtext mathvariant="italic">j</mtext></mrow></msub><mtext>(</mtext><mtext mathvariant="italic">x</mtext><mtext>,</mtext><mtext mathvariant="italic">y</mtext><msup><mrow><mtext>)∥</mtext></mrow><mrow><mtext>2</mtext></mrow></msup><mtext> </mtext><mtext mathvariant="italic">dxdy</mtext><mtext>,</mtext></mrow></math><img id="ib0010" file="imgb0010.tif" wi="134" he="10" img-content="math" img-format="tif"/></maths> wherein the size of the input plane is <i>MXM</i> and the size of the window support <i>W</i> of the hidden image in the output plane is <i>M</i><sub><i>W</i></sub><i>XM</i><sub><i>W</i></sub>. When the reduction rate of these error functions falls below some predefined value, the iterations can be stopped.</p>
<p id="p0054" num="0054">As known from the above-indicated article "<i>Learning in correlators based on projections onto constraint sets</i>", to guarantee that these errors will never diverge, the correlator should be an energy-conserving operator, which is inherently achieved, if the key function <i>H(u,v)</i> is a phase-only function. Additionally, the case should be such that, among all the functions that belong to the constraint sets, the two projected functions in the <i>j</i>th iteration, <i>P</i><sub><i>1</i></sub><i>[c</i><sub><i>j</i></sub><i>(ξ, η)]</i> and <i>P</i><sub><i>2</i></sub>[<i>g</i><sub><i>j</i></sub>(<i>x</i>,<i>y</i>)], are the functions closest (by means of the mean-square metric) to the functions c<sub>j</sub>(ξ,η) and g<sub>j</sub>(<i>x</i>,<i>y</i>), respectively. This condition is also satisfied in the invented method, since the phase distributions are the same before and after the projections in both domains. Therefore, the POCS iteration algorithm used in the preferred embodiment of the invention can never diverge, and at most the errors may stagnate at some values.<!-- EPO <DP n="18"> --></p>
<p id="p0055" num="0055">It should be noted that for the reason of providing the nondiverging feature of the iteration algorithm, phase-only functions are preferably used as spatial filters (key functions) in the spatial-frequency domain. When using an optical realization of the correlator at the decryption side, the phase-only filters are also preferred. These filters theoretically do not absorb energy and thus promote maximum system efficiency. The construction and operation of such an optical correlator will be described below with reference to Fig. 6.</p>
<p id="p0056" num="0056">Turning back to Fig. 3A, the second operational stage is aimed at converting the complex function <i>g</i><sub><i>n</i></sub><i>(x,y)</i> into a binary function <i>b(x,y)</i>. By displaying <i>b(x,y)</i> on the input plane of the correlator, the hidden image should be obtained in the output of the correlator equipped with the same filter function H(u,v). It should be understood that in the usual halftone binarization, only a single, positive, real gray-tone function is converted into a binary function. However, in the present case two positive real functions are to be encoded, phase θ<sub><i>n</i></sub><i>(x,y)</i> and magnitude |<i>g</i><sub><i>n</i></sub>(<i>x</i>,<i>y</i>)|, which is close enough to the visible image <i>f(x,y)</i> if the error <i>e </i><sub><i>g,n</i></sub> is indeed small.</p>
<p id="p0057" num="0057">Following computer-generated hologram (CGH) techniques [A. W Lohmann and D. P. Paris, "Binary Fraunhofer holograms generated by computer," Appl. Opt. 6, 1739-1748 (1967)], in the present invention, the magnitude |<i>g</i><sub><i>n</i></sub>(<i>x</i>,<i>y)</i>| is encoded in the conventional manner with DAM, and the phase <i>θ</i><sub><i>n</i></sub><i>(x</i>,<i>y)</i> is encoded with DPM. Every cell of the complex gray-tone function <i>g</i><sub><i>n</i></sub>(<i>x</i>,<i>y)</i>, the so-called pixel of a certain gray level, is replaced by a binary matrix of dots (sub-pixels) of a size <i>d</i> x <i>d</i>. Inside each matrix there is a predetermined shape of an area occupied by dot The dot is represented by binary value "1". The area occupied by the dots in the cell corresponds to the respective gray level of the first visible pattern, and the relative position of this area within the cell corresponds to the magnitude of the second hidden pattern. To this end, in the (<i>k</i>,<i>l</i>)th cell, the area occupied by the corresponding number of dots (e.g., one dot) is determined by the value of |<i>g</i><sub><i>n</i></sub>(<i>x</i><sub><i>k</i></sub>,<i>y</i><sub><i>l</i></sub><i>)</i>|, and the position of this area is determined by the phase value of <i>θ</i><sub><i>n</i></sub><i>(x</i><sub><i>k</i></sub><i>,y</i><sub><i>l</i></sub><i>)</i>.<!-- EPO <DP n="19"> --></p>
<p id="p0058" num="0058"><b>Fig. 5A</b> schematically illustrates such a cell <b>20</b> with the dots' area <b>22</b> in the final halftone binary picture <i>b</i>(<i>x</i>,<i>y</i>), in which an approximation of the visible image <i>f</i>(<i>x</i>,<i>y</i>), i.e., |<i>g</i><sub><i>n</i></sub>(<i>x</i>,<i>y</i>)|, is encoded by the area of the dots, <i>θ</i><sub><i>j</i></sub><i>(x</i>,<i>y)</i> is embedded into the halftone pattern by the position of the dots, and the hidden image <i>a(ξ</i>,<i>η)</i> is exposable at the output plane of the correlator. In the present example of Fig. 5A, without loss of generality, the shape of the dots' area <b>22</b> is chosen as a square, and each dot is translated only along the horizontal axis. Therefore, for the binary halftone picture <i>b(x</i>,<i>y</i>), we have:<maths id="math0011" num=""><img id="ib0011" file="imgb0011.tif" wi="137" he="24" img-content="math" img-format="tif"/></maths> Here, the values of θ<sub><i>n</i></sub><i>(x</i>,<i>y)</i> are defined in the interval [-π,π], and 0 ≤ |g<sub>n</sub>(<i>x</i>,<i>y</i>)| ≤ 1. The function <i>rect(x</i>/<i>a)</i> is defined as "1" for |<i>x</i>| <i>≤ a</i>/<i>2</i> and as "0" otherwise. The superscript <i>B</i> indicates that the summation is Boolean, such that if two adjacent <i>rect</i> functions overlap, their sum is equal to "1".</p>
<p id="p0059" num="0059">It should be understood that translation of dots along the horizontal axis only is associated with hiding one image within the halftone representation of another, visible image. To hide two different images within the same halftone representation of the visible image, translation of dots along two mutually perpendicular axes is carried out.</p>
<p id="p0060" num="0060">The halftone binary picture <i>b(x,y)</i> is a 2-D grating, and its Fourier transform is an array of 2-D Fourier orders on the spatial frequency plane separated by <i>M</i> pixels from one another. <b>Fig. 5B</b> exemplifies a typical spatial spectrum of the grating <i>b(x,y)</i>.<!-- EPO <DP n="20"> --></p>
<p id="p0061" num="0061">Following the analysis of the detour-phase CGH, it can be shown that an approximation of the complex function <i>G</i><sub><i>n</i></sub><i>(u,v)</i>, i.e., the FT of <i>g</i><sub><i>n</i></sub>(<i>x</i>,<i>y</i>), is obtained in the vicinity of the first Fourier-order component Thus, the approximation is expressed as follows:<maths id="math0012" num="(7)"><math display="block"><mrow><mtext mathvariant="italic">B</mtext><mtext>(</mtext><mtext mathvariant="italic">u</mtext><mtext>,</mtext><mtext mathvariant="italic">v</mtext><mtext>)≈</mtext><msub><mrow><mtext mathvariant="italic">G</mtext></mrow><mrow><mtext mathvariant="italic">n</mtext></mrow></msub><mtext>(</mtext><mtext mathvariant="italic">u</mtext><mtext>,</mtext><mtext mathvariant="italic">v</mtext><mtext>)   |</mtext><mtext mathvariant="italic">u</mtext><mtext>-</mtext><mtext mathvariant="italic">M</mtext><mtext>Δ</mtext><mtext mathvariant="italic">u</mtext><mtext>|≤</mtext><mtext mathvariant="italic">M</mtext><mtext>Δ</mtext><mtext mathvariant="italic">u</mtext><mtext>/2,</mtext><mspace linebreak="newline"/><mtext> |</mtext><mtext mathvariant="italic">v</mtext><mtext>|≤</mtext><mtext mathvariant="italic">M</mtext><mtext>Δ/2</mtext></mrow></math><img id="ib0012" file="imgb0012.tif" wi="91" he="5" img-content="math" img-format="tif"/></maths> Here, <i>Δu</i>x<i>Δv</i> is the size of the pixel (the smallest element in the spatial frequency plane) and <i>B(u,v)</i> is the FT of the halftone binary function <i>b(x,y).</i></p>
<p id="p0062" num="0062">The fact that the distribution about the first order is only an approximation of <i>G</i><sub><i>n</i></sub>(<i>u</i>,<i>v</i>) may introduce some error in the reconstructed image. This error is inversely dependent on the number of quantization levels used in the halftone picture. The number of quantization levels is naturally determined by the cell size <i>d</i>. Because the interesting distribution occupies only part of the spatial-frequency plane about the first-order component, this area of <i>M'M</i> pixels can be isolated about a point (<i>M</i>,0). The isolated area is multiplied by the filter function <i>H</i>(<i>u</i>,<i>v</i>) and inversely Fourier transformed onto the output plane.</p>
<p id="p0063" num="0063">The approximate output distribution is as follows:<maths id="math0013" num="(8)"><math display="block"><mrow><mtext mathvariant="italic">c</mtext><mtext>(</mtext><mtext mathvariant="italic">ξ</mtext><mtext>,</mtext><mtext mathvariant="italic">η</mtext><mtext>) ≈ </mtext><mtext mathvariant="italic">IFT</mtext><mtext>[</mtext><msub><mrow><mtext mathvariant="italic">G</mtext></mrow><mrow><mtext mathvariant="italic">n</mtext></mrow></msub><mtext>(</mtext><mtext mathvariant="italic">u</mtext><mtext>,</mtext><mtext mathvariant="italic">v</mtext><mtext>)</mtext><mtext mathvariant="italic">H</mtext><mtext>(</mtext><mtext mathvariant="italic">u, v</mtext><mtext>)]</mtext></mrow></math><img id="ib0013" file="imgb0013.tif" wi="55" he="5" img-content="math" img-format="tif"/></maths></p>
<p id="p0064" num="0064">Consequently, the magnitude of output function |<i>c(ξ,η)</i>| is approximately equal to the hidden image <i>a</i>(<i>ξ</i>,<i>η</i>).</p>
<p id="p0065" num="0065">Reference is now made to Fig. 6 illustrating an optical assembly <b>30</b> presenting the optical version of this correlator. The optical assembly comprises two lenses <b>32</b> and <b>34</b> of equal focal length <i>f</i>. The lenses <b>32</b> and <b>34</b> are arranged in a spaced-apart parallel relationship, such that they are spaced a distance 2<i>f</i> along their optical axes, and the optical axes are spaced along the perpendicular<!-- EPO <DP n="21"> --> axis a distance <i>λf</i>/<i>d</i>. The halftone picture <i>b(x</i>,<i>y)</i> is displayed on a focal plane <b>F</b><sub><b>1</b></sub> of the lens <b>32</b> and is illuminated by a plane wave. As a result, multiple diffraction orders are obtained on a back focal plane <b>F</b><sub><b>2</b></sub>, each at the distance <i>λf</i>/<i>d</i> from its neighbors. The area of the first diffraction order of the size (λ<i>f</i>/<i>Md</i>)<i>x</i>(λ<i>f</i>/<i>Md</i>) is multiplied by the phase only filter mask <i>H(u,v),</i> which is located in the focal plane <b>F</b><sub><b>2</b></sub><b>,</b> whereas the entire spectral area is blocked. The lens <b>34</b> performs a Fourier transform onto its focal plane <b>F</b><sub><b>3</b></sub>, where the hidden image is assumed to come into sight. In this scheme, it is assumed that the input halftone picture <i>b(x</i>,<i>y)</i> is a transmission mask that modulates the plane wave. It should be understood although not specifically shown, that when the halftone picture is printed on a regular opaque paper, it has to be recorded first by a digital camera. Then the recorded binary image can be displayed on a spatial light modulator and processed by the optical assembly <b>30</b>. Hence, for the purposes of the present invention, an optical scanner of the conventional type either equipped with the optical assembly <b>30</b> or connectable to a digital correlator, can be used to identify the hidden image.</p>
<p id="p0066" num="0066">Turning back to the experimental results of Figs. 2A-2E, these results were obtained by applying the halftone coding method with a digital correlator, the size of each one of the three planes in the POCS algorithm being 128x128 pixels. The experiments with all five pairs were performed with the same phase filter <i>H</i>(<i>u</i>,<i>v</i>), for which the phase distribution was generated by the random-number generator of the computer, and the same function <i>h*</i>(<i>-x</i>, <i>-y</i>) was used in the correlation. The POCS algorithm was iterated on average as many as 50 times. Additional iterations did not meaningfully reduce the two errors <i>e</i><sub><i>c,j</i></sub> and <i>e</i><sub><i>g,j</i></sub>. After completing the POCS algorithm, the resultant complex functions <i>g</i><sub><i>n</i></sub>(<i>x</i>,<i>y</i>) was binarized according to the above equation (6). The size of each cell in these experiments is 19x19 pixels, and consequently the gray-tone image is quantized with 10 levels of magnitude (considering the square dots' area) and 19 levels of phase.<!-- EPO <DP n="22"> --></p>
<p id="p0067" num="0067"><b>Fig. 7A</b> shows an enlarged region of one of the halftone pictures <b>10</b>. For comparison, the same region but without modulation of the dot position is shown in <b>Fig. 7B</b>.</p>
<p id="p0068" num="0068">The robustness of the method was also examined, and the results are illustrated in Figs. <b>8A-8E</b> and <b>9A-9E</b>. This robustness is achieved because each pixel in the output is obtained as a weighted sum of many input pixels. The exact number of pixels that participate in this summation is equal to the size of the function <i>h</i>(<i>x</i>,<i>y</i>). In the present example, the function <i>h</i>(<i>x</i>,<i>y</i>) has not been narrowed.</p>
<p id="p0069" num="0069">In the examples of distortions shown in Figs. 8A-8E, the halftone pictures <b>10A-10E</b> obtained in the experiments of Figs. 2A-2E were covered in the vicinity of their centers with zero-valued squares of an area that varied from 11% of the original picture area (picture <b>10E</b>) to 55% at the leftmost figure to 55% (picture <b>10A</b>). Patterns <b>16A-16E</b> are extracted hidden images revealed from these covered halftone pictures, i.e., correlation results between the pictures <b>10A-10E</b>, respectively, and the reference function. As shown, the hidden image can still be recognized, even when 55% of the area of the halftone picture is missing.</p>
<p id="p0070" num="0070">In the examples of distortions shown in Figs. 9A-9E, various amounts of pixel values in the halftone pictures <b>10A'-10E'</b> were randomly flipped from their original values shown in Figs. 2A-2E. The number of flipped pixels is varied from 8% (picture <b>10E'</b>) to 40% (picture <b>10A'</b>). Patterns <b>16A'-16E'</b> are extracted hidden images obtained as the results of the correlation between pictures <b>10A'-10E'</b> and the reference function. As shown, the same robust behavior was maintained for this type of noise.</p>
<p id="p0071" num="0071"><b>Fig. 10</b> illustrates the geometrical distortion invariance of the correlator. As shown, rotation of the input halftone picture <b>HP</b><sub><b>in</b></sub> results in the corresponding rotation of the extracted hidden image in the output <b>HI</b><sub><b>out</b></sub><b>,</b> and does not affect the quality of the extracted hidden image.<!-- EPO <DP n="23"> --></p>
<p id="p0072" num="0072">Thus, the present invention provides for concealing an arbitrary image in a different arbitrary halftone picture. A digital or optical correlator with a unique key filter can recover the hidden image. Every part of the hidden image is concealed globally in all the points of the halftone picture. This feature increases the robustness of the process to noise and distortions. Using the correlator has the following advantages:</p>
<p id="p0073" num="0073">The image reconstruction from the halftone picture is relatively robust to noise. This is so because, for some requirements on the size of the key reference function, the hidden image is memorized globally in all the halftone dots. This means that every pixel in the output image is obtained as a weighted sum of the entire input picture's dots. Therefore, even if several pixels from the input halftone figure are distorted from their correct values, the output result can still be recognized because of the contributions from the other, non-distorted pixels. The spatial correlator has the property of the shift invariance, which means that, no matter where the halftone image appears at the input plane, the hidden output image is produced on the output plane.</p>
<p id="p0074" num="0074">Additionally, the same deciphering system can be implemented as an optical, electrical, or hybrid system. This is due to the fact that the optical VanderLugt correlator, the hybrid joint-transform correlator, or a digital computer can be used as the spatial 2-D correlator.</p>
<p id="p0075" num="0075">When digital correlations are used, it is obvious to use the fast-FT algorithm as a tool for computing the correlations, both in the coding process and in reading the hidden images. Therefore, the computation time is relatively short as compared to those of other, more general, linear space-variant processors.</p>
<p id="p0076" num="0076">Reference is now made to <b>Figs. 11A-11B</b> illustrating how the present invention can be used for items identification. Fig. 11A shows an item <b>40</b> that carries an advertisement information piece 12 (constituting a first visible pattern) and a bar code 14 (constituting a second pattern), which is typically presented in items to be purchased. Fig. 11B shows the same item <b>40</b>, but with<!-- EPO <DP n="24"> --> the halftone picture <b>10</b> of the visible pattern <b>12</b> with the bar code pattern <b>14</b> hidden therein. This technique enables optimal using of the space on the item's surface. Such a halftone picture may be printed directly onto the item's surface or incorporated in a label attachable to the item.</p>
<p id="p0077" num="0077"><b>Fig. 12</b> illustrates how the present invention can be used for authentication purposes. A person's identification card <b>50</b> includes a halftone picture <b>52</b>, in which some personal information a photo in the present example, is visible and information indicative of the person's fingerprint is hidden. Data <b>FD</b> representative of the cardholder's fingerprint is collected via any known suitable system, generally designated <b>53</b>, and supplied to a processor <b>54</b> (typically computer system). Data representative of the halftone picture <b>52</b> is also supplied to the processor <b>54</b>. The processor <b>54</b> is preprogrammed with the digital correlator of the present invention (constituting a decoding device) that processes the data indicative of the halftone picture to extract data representative of the hidden image. Another suitable utility of the computer device <b>54</b> compares this data to the cardholder's fingerprint FD thereby enabling authentication of the cardholder: if the data representative of the hidden image and data representative of the fingerprint of the cardholder do not match each other, the processor <b>54</b> will generate a warning signal. This is a few minutes procedure that provides for high-accuracy identification/authentication. It should be understood, that although in the present example the correlator (digital or optical) is shown as the constructional part of the same computer system performing the authentication, such correlator may be incorporated in a separate unit connectable to the processor <b>54</b> to supply thereto data representative of the extracted hidden pattern.</p>
<p id="p0078" num="0078">Those skilled in the art will readily appreciate that various modifications and changes can be applied to the embodiments of the invention as hereinbefore exemplified without departing from its scope defined in and by the appended claims.</p>
</description><!-- EPO <DP n="25"> -->
<claims id="claims01" lang="en">
<claim id="c-en-01-0001" num="0001">
<claim-text>A method as implemented on an encoding device for hiding within a visible representation of a first pattern, at least one second gray-level pattern, the method comprising the steps of:
<claim-text><b>(i)</b> selecting a predetermined key function;</claim-text>
<claim-text><b>(ii)</b> utilizing said key function to create a binary halftone representation of the first pattern, in which the first pattern is visible and the at least one second gray-level pattern is hidden, each cell in said binary halftone representation having halftone dots' position distribution corresponding to gray-level distribution of the at least one second pattern, thereby enabling processing of said binary halftone representation by a two-dimensional spatial correlator based on the key function to extract data representative of the at least one second gray-level pattern.</claim-text></claim-text></claim>
<claim id="c-en-01-0002" num="0002">
<claim-text>The method according to Claim 1, wherein said binary halftone representation is such that, when correlated with a reference function, that relates to said predetermined key function by a spatial transformation, results in said at least one second pattern.</claim-text></claim>
<claim id="c-en-01-0003" num="0003">
<claim-text>The method according to Claim 2, wherein the creation of said binary halftone representation of the first pattern comprises the steps of:
<claim-text>- defining a matching condition between first and second complex functions describing the first and second patterns, respectively, said matching condition presenting a transformation between the first and second functions;</claim-text>
<claim-text>- determining a corresponding solution for a variable characteristic of the first complex function, such that said variable characteristic based on said solution, when multiplied by the first pattern and passed through the two-dimensional spatial correlator, results in the<!-- EPO <DP n="26"> --> complex function with a magnitude equal to the second hidden pattern; and</claim-text>
<claim-text>- binarizing the first complex function based on said solution to thereby create said binary halftone representation.</claim-text></claim-text></claim>
<claim id="c-en-01-0004" num="0004">
<claim-text>The method according to Claim 3, wherein the determination of said solution comprises a sequence of iterations of the transformation.</claim-text></claim>
<claim id="c-en-01-0005" num="0005">
<claim-text>The method according to Claim 4, wherein the iteration process utilizes a projection-onto-constraint-sets (POCS) algorithm.</claim-text></claim>
<claim id="c-en-01-0006" num="0006">
<claim-text>The method according to Claim 3, wherein the binarizing of the first pattern comprises shifting the halftone dots within each cell along at least one axis in accordance with said solution for the variable characteristic, thereby hiding said at least one second pattern within the halftone representation.</claim-text></claim>
<claim id="c-en-01-0007" num="0007">
<claim-text>The method according to Claim 3, wherein the binarizing of the first pattern comprises shifting the halftone dots within each cell along two mutually perpendicular axes in accordance with said solution for the variable characteristic, thereby hiding two different patterns within the halftone representation.</claim-text></claim>
<claim id="c-en-01-0008" num="0008">
<claim-text>The method according to Claim 1, wherein said key function is a phase only function.</claim-text></claim>
<claim id="c-en-01-0009" num="0009">
<claim-text>The method according to Claim 2, wherein the transformation is based on a 2-D Fourier transform, said predetermined reference function relating to the key function by the 2-D Fourier transform.</claim-text></claim>
<claim id="c-en-01-0010" num="0010">
<claim-text>The method according to Claim 9, wherein said predetermined reference function is the complex conjugate of a 180°-rotated function obtained as the inverse Fourier transform of the key function.</claim-text></claim>
<claim id="c-en-01-0011" num="0011">
<claim-text>The method according to Claim 9, wherein said matching condition is defined as follows:<maths id="math0014" num=""><math display="block"><mrow><mtext mathvariant="italic">a</mtext><msub><mrow><mtext>(ξ,η)exp[i</mtext></mrow><mrow><mtext>ψ</mtext></mrow></msub><mtext>(ξ,η)]=IFT{FT(</mtext><mtext mathvariant="italic">f</mtext><mtext>(</mtext><mtext mathvariant="italic">x,y</mtext><mtext>)exp[iθ(</mtext><mtext mathvariant="italic">x</mtext><mtext>,</mtext><mtext mathvariant="italic">y</mtext><mtext>)])exp[iφ(</mtext><mtext mathvariant="italic">u</mtext><mtext>,</mtext><mtext mathvariant="italic">v</mtext><mtext>)]}</mtext></mrow></math><img id="ib0014" file="imgb0014.tif" wi="103" he="6" img-content="math" img-format="tif"/></maths> wherein <i>a(ξ</i>,<i>η)</i>exp<i>[iψ(ξ</i>,<i>η)]</i> is the second complex function of the second pattern <i>a</i>(ξ,η); <i>f(x</i>,<i>y)exp[iθ(x</i>,<i>y)]</i> is the first complex function of the first pattern<!-- EPO <DP n="27"> --> <i>f</i>(<i>x</i>,<i>y</i>); and <i>exp[iφ(u</i>,<i>v)]</i> is the phase only key function, <i>θ(x</i>,<i>y)</i> being the solution of the variable characteristic <i>exp[iθ(x</i>,<i>y)]</i> of the first pattern.</claim-text></claim>
<claim id="c-en-01-0012" num="0012">
<claim-text>The method according to Claim 11, wherein said 2-D correlator is:<maths id="math0015" num=""><math display="block"><mrow><mtext mathvariant="italic">a</mtext><mtext>(ξ,η)exp[iψ(ξ,η)]=</mtext><mtext mathvariant="italic">f</mtext><mtext>(</mtext><mtext mathvariant="italic">x</mtext><mtext>,</mtext><mtext mathvariant="italic">y</mtext><mtext>)exp[iθ(</mtext><mtext mathvariant="italic">x</mtext><mtext>,y)] ⊗ </mtext><mtext mathvariant="italic">h*</mtext><mtext>(</mtext><mtext mathvariant="italic">-x</mtext><mtext>,</mtext><mtext mathvariant="italic">-y</mtext><mtext>)</mtext></mrow></math><img id="ib0015" file="imgb0015.tif" wi="88" he="5" img-content="math" img-format="tif"/></maths> wherein the function <i>h</i>*(-<i>x</i>,-<i>y</i>) is said predetermined reference function related to the key function by a 2-D Fourier transform.</claim-text></claim>
<claim id="c-en-01-0013" num="0013">
<claim-text>The method according to Claim 1, wherein the extraction of said hidden pattern from the binary halftone representation of the first pattern comprises applying a data-reading utility to said halftone representation to generate data indicative of said halftone representation, and processing said data indicative of the halftone representation with the 2-D correlator.</claim-text></claim>
<claim id="c-en-01-0014" num="0014">
<claim-text>The method according to Claim 13, wherein said data-reading utility is an optical scanner.</claim-text></claim>
<claim id="c-en-01-0015" num="0015">
<claim-text>The method according to Claim 13, wherein said 2-D correlator for processing the halftone representation is an optical assembly.</claim-text></claim>
<claim id="c-en-01-0016" num="0016">
<claim-text>An encoding device comprising an interface utility for entering input data, and a data processing and analyzing utility, which is responsive to the input data including first and second complex functions representative of first and second patterns, respectively, and a key function, to create a binary halftone representation of the first pattern, in which the first pattern is visible and the second pattern is hidden, and in which each cell has halftone dots' position distribution corresponding to gray-level distribution of the second pattern.</claim-text></claim>
<claim id="c-en-01-0017" num="0017">
<claim-text>A decoding device for use in extracting a hidden pattern contained in a binary halftone representation of another visible pattern, wherein said halftone representation is created by the method of Claim 1, the decoding device comprising:
<claim-text>- a two-dimensional spatial correlator for processing input data representative of the binary halftone representation with a spatial filter in the form of said key function, such that the hidden image is<!-- EPO <DP n="28"> --> obtained in an output plane of the correlator as a correlation function between the binary halftone representation displayed in an input plane of said correator and a predetermined reference function related to said key function by a spatial transformation.</claim-text></claim-text></claim>
<claim id="c-en-01-0018" num="0018">
<claim-text>The device according to Claim 17, wherein said 2-D correlator is an optical assembly.</claim-text></claim>
<claim id="c-en-01-0019" num="0019">
<claim-text>The device according to Claim 18, wherein said optical assembly comprises two lens of the same focal length <i>f</i> which are spaced from each other by a distance 2f, and a phase only filter mask presenting said key function located at a central plane between the lenses.</claim-text></claim>
<claim id="c-en-01-0020" num="0020">
<claim-text>The device according to Claim 17, and also comprising a data-reading utility applicable to said halftone representation to produce said data indicative thereof.</claim-text></claim>
<claim id="c-en-01-0021" num="0021">
<claim-text>The device according to Claim 20, wherein said data-reading utility comprises a spatial light modulator.</claim-text></claim>
<claim id="c-en-01-0022" num="0022">
<claim-text>An item carrying a binary halftone representation of a first visible pattern that includes data representative of a second hidden pattern, each cell in said binary halftone representation having halftone dots' position distribution corresponding to gray-level distribution of the second pattern, thereby enabling processing of said binary halftone representation to extract data representative of the second hidden pattern by a two-dimensional spatial correlator based on a predetermined key function, which was used to create said binary halftone representation.</claim-text></claim>
<claim id="c-en-01-0023" num="0023">
<claim-text>An item identification system for identifying a hidden pattern contained in a binary halftone representation of a first visible pattern, the system comprising the decoding device of Claim 17.</claim-text></claim>
</claims><!-- EPO <DP n="29"> -->
<claims id="claims02" lang="de">
<claim id="c-de-01-0001" num="0001">
<claim-text>Verfahren, wie an einer Codiervorrichtung implementiert, um innerhalb einer sichtbaren Darstellung eines ersten Musters mindestens ein zweites Graustufenmuster zu verstecken, wobei das Verfahren die Schritte umfaßt:
<claim-text>(i) Auswählen einer vorbestimmten Schlüsselfunktion;</claim-text>
<claim-text>(ii) Verwenden der Schlüsselfunktion, um eine binäre Halbtondarsteilung des ersten Musters zu erzeugen, in der das erste Muster sichtbar ist und das mindestens eine zweite Graustufenmuster versteckt ist, wobei jede Zelle in der binären Halbtondarstellung eine Halbtonpunkt-Positionsverteilung entsprechend der Graustufenverteilung des mindestens einen zweiten Musters aufweist, wodurch die Verarbeitung der binären Halbtondarstellung durch einen zweidimensionalen räumlichen Korrelator auf der Basis der Schlüsselfunktion ermöglicht wird, um Daten zu gewinnen, die das mindestens eine zweite Graustufenmuster darstellen.</claim-text></claim-text></claim>
<claim id="c-de-01-0002" num="0002">
<claim-text>Verfahren nach Anspruch 1, wobei die binäre Halbtondarstellung derart ist, daß sie, wenn sie mit einer Bezugsfunktion korreliert wird, die sich durch eine räumliche Transformation auf die vorbestimmte Schlüsselfunktion bezieht, das mindestens eine zweite Muster ergibt.</claim-text></claim>
<claim id="c-de-01-0003" num="0003">
<claim-text>Verfahren nach Anspruch 2, wobei die Erzeugung der binären Halbtondarstellung des ersten Musters die Schritte umfaßt:
<claim-text>- Definieren einer Übereinstimmungsbedingung zwischen einer ersten und einer zweiten komplexen Funktion, die das erste bzw. das zweite Muster beschreiben, wobei die Übereinstimmungsbedingung eine Transformation zwischen der ersten und der zweiten Funktion darstellt;</claim-text>
<claim-text>- Bestimmen einer entsprechenden Lösung für eine variable Kennlinie der ersten komplexen Funktion, so daß die variable Kennlinie auf der Basis der Lösung, wenn sie mit dem ersten Muster multipliziert wird und durch den zweidimensionalen räumlichen Korrelator geleitet wird, die komplexe Funktion mit einer Größe gleich dem zweiten versteckten Muster ergibt; und<!-- EPO <DP n="30"> --></claim-text>
<claim-text>- Binarisieren der ersten komplexen Funktion auf der Basis der Lösung, um dadurch die binäre Halbtondarstellung zu erzeugen.</claim-text></claim-text></claim>
<claim id="c-de-01-0004" num="0004">
<claim-text>Verfahren nach Anspruch 3, wobei die Bestimmung der Lösung eine Folge von Iterationen der Transformation umfaßt.</claim-text></claim>
<claim id="c-de-01-0005" num="0005">
<claim-text>Verfahren nach Anspruch 4, wobei der Iterationsprozeß einen Algorithmus der Projektion auf Randbedingungssätze (POCS) verwendet.</claim-text></claim>
<claim id="c-de-01-0006" num="0006">
<claim-text>Verfahren nach Anspruch 3, wobei die Binarisierung des ersten Musters die Verschiebung der Halbtonpunkte innerhalb jeder Zelle entlang mindestens einer Achse gemäß der Lösung für die variable Kennlinie umfaßt, wodurch das mindestens eine zweite Muster innerhalb der Halbtondarstellung versteckt wird.</claim-text></claim>
<claim id="c-de-01-0007" num="0007">
<claim-text>Verfahren nach Anspruch 3, wobei die Binarisierung des ersten Musters die Verschiebung der Halbtonpunkte innerhalb jeder Zelle entlang zwei zueinander senkrechten Achsen gemäß der Lösung für die variable Kennlinie umfaßt, wodurch zwei verschiedene Muster innerhalb der Halbtondarstellung versteckt werden.</claim-text></claim>
<claim id="c-de-01-0008" num="0008">
<claim-text>Verfahren nach Anspruch 1, wobei die Schlüsselfunktion eine Nur-Phasen-Funktion ist.</claim-text></claim>
<claim id="c-de-01-0009" num="0009">
<claim-text>Verfahren nach Anspruch 2, wobei die Transformation auf einer 2-D-Fouriertransformation basiert, wobei sich die vorbestimmte Bezugsfunktion auf die Schlüsselfunktion durch die 2-D-Fouriertransformation bezieht.</claim-text></claim>
<claim id="c-de-01-0010" num="0010">
<claim-text>Verfahren nach Anspruch 9, wobei die vorbestimmte Bezugsfunktion das komplex Konjugierte einer um 180° gedrehten Funktion ist, das als inverse Fouriertransformation der Schlüsselfunktion erhalten wird.<!-- EPO <DP n="31"> --></claim-text></claim>
<claim id="c-de-01-0011" num="0011">
<claim-text>Verfahren nach Anspruch 9, wobei die Übereinstimmungsbedingung folgendermaßen definiert ist:<maths id="math0016" num=""><math display="block"><mrow><mtext>a(ξ,η)exp[iψ(ξ,η)]=IFT{FT(f(x,y)exp[iθ(x,y)])exp[iφ(u,v)]}</mtext></mrow></math><img id="ib0016" file="imgb0016.tif" wi="100" he="5" img-content="math" img-format="tif"/></maths> wobei a(ξ,η)exp[iψ(ξ,η)] die zweite komplexe Funktion des zweiten Musters a(ξ,η) ist; f(x,y)exp[iθ(x,y)] die erste komplexe Funktion des ersten Musters f(x,y) ist; und exp[iφ(u,v)] die Nur-Phasen-Schlüsselfunktion ist, wobei θ(x,y) die Lösung der variablen Kennlinie exp[iθ(x,y)] des ersten Musters ist.</claim-text></claim>
<claim id="c-de-01-0012" num="0012">
<claim-text>Verfahren nach Anspruch 11, wobei der 2-D-Korrelator folgendes ist:<maths id="math0017" num=""><math display="block"><mrow><mtext>a(ξ,η)exp[iψ(ξ,η)]=f(x,y)exp[iθ(x,y)] ⊗ h*(-x,-y)</mtext></mrow></math><img id="ib0017" file="imgb0017.tif" wi="84" he="5" img-content="math" img-format="tif"/></maths> wobei die Funktion h*(-x,-y) die vorbestimmte Bezugsfunktion ist, die sich auf die Schlüsselfunktion durch eine 2-D-Fouriertransformation bezieht.</claim-text></claim>
<claim id="c-de-01-0013" num="0013">
<claim-text>Verfahren nach Anspruch 1, wobei die Gewinnung des versteckten Musters aus der binären Halbtondarstellung des ersten Musters das Anwenden einer Datenleseeinrichtung auf die Halbtondarstellung, um Daten zu erzeugen, die die Halbtondarstellung anzeigen, und das Verarbeiten der Daten, die die Halbtondarstellung anzeigen, mit dem 2-D-Korrelator umfaßt.</claim-text></claim>
<claim id="c-de-01-0014" num="0014">
<claim-text>Verfahren nach Anspruch 13, wobei die Datenleseeinrichtung ein optischer Scanner ist.</claim-text></claim>
<claim id="c-de-01-0015" num="0015">
<claim-text>Verfahren nach Anspruch 13. wobei der 2-D-Korrelator zum Verarbeiten der Halbtondarstellung eine optische Anordnung ist.</claim-text></claim>
<claim id="c-de-01-0016" num="0016">
<claim-text>Codiervorrichtung mit einer Schnittstelleneinrichtung zum Eingeben von Eingangsdaten und einer Datenverarbeitungs- und Analyseeinrichtung, die auf die Eingangsdaten reagiert, einschließlich einer ersten und einer zweiten komplexen Funktion, die ein erstes bzw. ein zweites Muster darstellen, und einer Schlüsselfunktion, um eine binäre Halbtondarstellung des ersten Musters zu erzeugen, in der das erste Muster sichtbar ist und das zweite Muster versteckt ist, und wobei jede Zelle eine Halbtonpunkt-Positionsverteilung<!-- EPO <DP n="32"> --> entsprechend der Graustufenverteilung des zweiten Musters aufweist.</claim-text></claim>
<claim id="c-de-01-0017" num="0017">
<claim-text>Decodiervorrichtung zur Verwendung beim Gewinnen eines versteckten Musters, das in einer binären Halbtondarstellung eines anderen sichtbaren Musters enthalten ist, wobei die Halbtondarstellung durch das Verfahren nach Anspruch 1 erzeugt wird, wobei die Decodiervorrichtung umfaßt:
<claim-text>- einen zweidimensionalen räumlichen Korrelator zum Verarbeiten von Eingangsdaten, die die binäre Halbtondarstellung darstellen, mit einem räumlichen Filter in Form der Schlüsselfunktion, so daß das versteckte Bild in einer Ausgangsebene des Korrelators als Korrelationsfunktion zwischen der in einer Eingangsebene des Korrelators angezeigten binären Halbtondarstellung und einer vorbestimmten Bezugsfunktion, die sich durch eine räumliche Transformation auf die Schlüsselfunktion bezieht, erhalten wird.</claim-text></claim-text></claim>
<claim id="c-de-01-0018" num="0018">
<claim-text>Vorrichtung nach Anspruch 17, wobei der 2-D-Korrelator eine optische Anordnung ist.</claim-text></claim>
<claim id="c-de-01-0019" num="0019">
<claim-text>Vorrichtung nach Anspruch 18, wobei die optische Anordnung zwei Linsen mit derselben Brennweite f, die um einen Abstand 2f voneinander entfernt sind, und eine Nur-Phasen-Filtermaske, die die Schlüsselfunktion darstellt und sich in einer zentralen Ebene zwischen den Linsen befindet, umfaßt.</claim-text></claim>
<claim id="c-de-01-0020" num="0020">
<claim-text>Vorrichtung nach Anspruch 17 und auch mit einer Datenleseneinrichtung, die auf die Halbtondarstellung anwendbar ist, um die diese anzeigenden Daten zu erzeugen.</claim-text></claim>
<claim id="c-de-01-0021" num="0021">
<claim-text>Vorrichtung nach Anspruch 20, wobei die Datenleseeinrichtung einen räumlichen Lichtmodulator umfaßt.</claim-text></claim>
<claim id="c-de-01-0022" num="0022">
<claim-text>Gegenstand, der eine binäre Halbtondarstellung eines ersten sichtbaren Musters trägt, die Daten umfaßt, die ein zweites verstecktes Muster<!-- EPO <DP n="33"> --> darstellen, wobei jede Zelle in der binären Halbtondarstellung eine Halbtonpunkt-Positionsverteilung entsprechend der Graustufenverteilung des zweiten Musters aufweist, wodurch die Verarbeitung der binären Halbtondarstellung zur Gewinnung von Daten, die das zweite versteckte Muster darstellen, durch einen zweidimensionalen räumlichen Korrelator auf der Basis einer vorbestimmten Schlüsselfunktion, die verwendet wurde, um die binäre Halbtondarstellung zu erzeugen, ermöglicht wird.</claim-text></claim>
<claim id="c-de-01-0023" num="0023">
<claim-text>Gegenstandsidentifikationssystem zum Identifizieren eines in einer binären Halbtondarstellung eines ersten sichtbaren Musters enthaltenen versteckten Musters, wobei das System die Decodiervorrichtung nach Anspruch 17 umfaßt.</claim-text></claim>
</claims><!-- EPO <DP n="34"> -->
<claims id="claims03" lang="fr">
<claim id="c-fr-01-0001" num="0001">
<claim-text>Un procédé mis en oeuvre dans un dispositif de codage pour masquer, à l'intérieur d'une représentation visible d'un premier motif, au moins un deuxième motif en niveaux de grilles, le procédé comprenant les étapes consistant:
<claim-text>(i) à sélectionner une fonction clé prédéterminée;</claim-text>
<claim-text>(ii) à utiliser ladite fonction clé pour créer une représentation tramée binaire dudit premier motif, dans lequel le premier motif est visible et ledit au moins un deuxième motif en niveaux de grilles est caché, chaque cellule de ladite représentation tramée binaire présentant une répartition de position de points de trame correspondant à la répartition des niveaux de grilles dudit au moins un deuxième motif, permettant ainsi le traitement de ladite représentation tramée binaire au moyen d'un corrélateur spatial bidimensionnel basé sur la fonction clé afin d'extraire des données représentatives dudit au moins un deuxième motif en niveaux de grilles.</claim-text></claim-text></claim>
<claim id="c-fr-01-0002" num="0002">
<claim-text>Le procédé selon la revendication 1, dans lequel ladite représentation tramée binaire est telle que, lorsqu'elle est mise en corrélation avec une fonction de référence qui, grâce à une transformation spatiale, présente une relation avec ladite fonction clé prédéterminée, on obtient pour résultat ledit au moins un deuxième motif</claim-text></claim>
<claim id="c-fr-01-0003" num="0003">
<claim-text>Le procédé selon la revendication 2, dans lequel la création de ladite représentation tramée binaire du premier motif comprend les étapes consistant:
<claim-text>- à définir une condition de concordance entre une première et une deuxième fonction complexe décrivant le premier et le deuxième motifs respectivement, ladite condition de concordance présentant une transformation entre la première et la deuxième fonctions;</claim-text>
<claim-text>- à déterminer une solution correspondante pour une variable qui est caractéristique de ladite première fonction complexe de sorte que ladite caractéristique variable basée sur ladite solution, donne pour résultat, lorsqu'elle est multipliée par le premier motif et traverse ledit corrélateur spatial bidimensionnel, la fonction complexe présentant une grandeur égale au deuxième motif caché; et</claim-text>
<claim-text>- à binariser la première fonction complexe basée sur ladite solution de conséquemment créer ladite représentation tramée binaire.</claim-text><!-- EPO <DP n="35"> --></claim-text></claim>
<claim id="c-fr-01-0004" num="0004">
<claim-text>Le procédé selon la revendication 3, dans lequel la détermination de la solution comprend une séquence d'itération de ladite transformation.</claim-text></claim>
<claim id="c-fr-01-0005" num="0005">
<claim-text>Le procédé selon la revendication 4, dans lequel le processus d'itération utilise un algorithme de projection sur jeux de contrainte (FOCS).</claim-text></claim>
<claim id="c-fr-01-0006" num="0006">
<claim-text>Le procédé selon la revendication 3, dans lequel la binarisation du premier motif comprend le décalage des points de trame à l'intérieur de chaque cellule selon au moins un axe en correspondance à ladite solution obtenue pour la caractéristique variable, cachant ainsi au moins un deuxième motif à l'intérieur de la représentation tramée.</claim-text></claim>
<claim id="c-fr-01-0007" num="0007">
<claim-text>Le procédé selon la revendication 3, dans lequel la binarisation du premier motif comprend le décalage des points de trame à l'intérieur de chaque cellule selon deux axes mutuellement perpendiculaires en correspondance à ladite solution obtenue pour la caractéristique variable, ainsi deux motifs différents à l'intérieur de la représentation tramée.</claim-text></claim>
<claim id="c-fr-01-0008" num="0008">
<claim-text>Le procédé selon la revendication I, dans lequel ladite fonction clé est une fonction à phase uniquement.</claim-text></claim>
<claim id="c-fr-01-0009" num="0009">
<claim-text>Le procédé selon la revendication 2, dans lequel la transformation est basée sur une transformée bidimensionnelle de Fourier, ladite fonction de référence prédéterminée présentant une relation avec la fonction clé moyennant la transformée bidimensionnelle de Fourier.</claim-text></claim>
<claim id="c-fr-01-0010" num="0010">
<claim-text>Le procédé selon la revendication 9, dans lequel ladite fonction de référence prédéterminée est la conjuguée complexe d'une fonction tournée de 180°, obtenue comme la transformée de Fourier inverse de la fonction clé.</claim-text></claim>
<claim id="c-fr-01-0011" num="0011">
<claim-text>Le procédé selon la revendication 9, dans lequel ladite condition de concordance est définie de la façon suivante:<maths id="math0018" num=""><math display="block"><mrow><mtext>α</mtext><mtext mathvariant="italic">(</mtext><mtext>ξ,η</mtext><mtext mathvariant="italic">)</mtext><mtext>exp [</mtext><mtext mathvariant="italic">i</mtext><mtext>ψ</mtext><mtext mathvariant="italic">(</mtext><mtext>ξ,</mtext><mtext mathvariant="italic">η)]=</mtext><mtext>IFT{FT</mtext><mtext mathvariant="italic">(f(x</mtext><mtext>,</mtext><mtext mathvariant="italic">y)</mtext><msup><mrow><mtext>exp [i</mtext></mrow><mrow><mtext>θ</mtext></mrow></msup><mtext mathvariant="italic">(x</mtext><mtext>,</mtext><mtext mathvariant="italic">y)</mtext><mtext>]</mtext><mtext mathvariant="italic">)</mtext><mtext>exp[iφ(</mtext><mtext mathvariant="italic">u</mtext><mtext>,</mtext><mtext mathvariant="italic">v</mtext><mtext>)]}</mtext></mrow></math><img id="ib0018" file="imgb0018.tif" wi="109" he="6" img-content="math" img-format="tif"/></maths> dans lequel
<claim-text>- α(ζ,η)exp [<i>i</i>ψ(ξ,η)] est la deuxième fonction complexe du deuxième motif α(ξ,η);</claim-text>
<claim-text>- <i>f</i>(<i>x</i>,<i>y</i>)exp [i<sup>θ</sup>(<i>x</i>,<i>y</i>)] est la première fonction complexe du premier motif <i>f</i>(<i>x</i>,<i>y</i>);</claim-text> et
<claim-text>- exp [iφ <i>(u</i>, <i>v</i>)] est la fonction clé à phase uniquement;<!-- EPO <DP n="36"> --> θ(<i>x</i>,<i>y</i>) étant la solution de la caractéristique variable [i<sup>θ</sup>(<i>x</i>,<i>y</i>)] du premier motif.</claim-text></claim-text></claim>
<claim id="c-fr-01-0012" num="0012">
<claim-text>Le procédé selon la revendication 11, dans lequel le corrélateur bidimensionnel est:<maths id="math0019" num=""><math display="block"><mrow><mtext mathvariant="italic">α(ζ,</mtext><mtext>η</mtext><mtext mathvariant="italic">)</mtext><mtext>exp </mtext><mtext mathvariant="italic">[i</mtext><mtext>ψ</mtext><mtext mathvariant="italic">(</mtext><mtext>ξ, η</mtext><mtext mathvariant="italic">)]</mtext><mtext>=</mtext><mtext mathvariant="italic">f(x</mtext><mtext>,</mtext><mtext mathvariant="italic">y)</mtext><mtext>exp [iθ</mtext><mtext mathvariant="italic">(x</mtext><mtext>,</mtext><mtext mathvariant="italic">y)</mtext><mtext>] ⊗ </mtext><mtext mathvariant="italic">h</mtext><mtext>*(-</mtext><mtext mathvariant="italic">x</mtext><mtext>,-</mtext><mtext mathvariant="italic">y</mtext><mtext>)</mtext></mrow></math><img id="ib0019" file="imgb0019.tif" wi="96" he="5" img-content="math" img-format="tif"/></maths> dans lequel la fonction <i>h*</i>(<i>-x,-y</i>) est ladite fonction de référence prédéterminée en relation avec ladite fonction grâce à une transformée bidimensionnelle de Fourier.</claim-text></claim>
<claim id="c-fr-01-0013" num="0013">
<claim-text>Le procédé selon la revendication 1, dans lequel l'extraction dudit motif caché à partir de la représentation transformée binaire du premier motif comprend l'application d'un utilitaire de lecture de données à ladite représentation tramée, afin de générer des données qui sont indicatives de ladite représentation tramée, et le traitement desdites données indicatives de la représentation tramée au moyen du corrélateur bidimensionnel.</claim-text></claim>
<claim id="c-fr-01-0014" num="0014">
<claim-text>Le procédé selon la revendication 13, dans lequel ledit utilitaire de lecture de données est un appareil de balayage optique.</claim-text></claim>
<claim id="c-fr-01-0015" num="0015">
<claim-text>Le procédé selon la revendication 13, dans lequel ledit corrélateur bidimensionnel pour le traitement de la représentation tramée est un assemblage optique.</claim-text></claim>
<claim id="c-fr-01-0016" num="0016">
<claim-text>Un dispositif de codage comprenant un utilitaire d'interface pour la saisie de données d'entrée, et un utilitaire de traitement et d'analyse de données sensible aux dites données d'entrée comprenant des premières et des deuxièmes fonctions complexes qui sont représentatives desdits premier et deuxième motifs respectivement, et une fonction clé, afin de créer une représentation tramée binaire dudit premier motif, dans lequel ledit premier motif est visible et le deuxième motif est caché, et dans lequel chaque cellule présente une répartition de position des points de trame qui correspond à la répartition en niveaux de grilles du deuxième motif.</claim-text></claim>
<claim id="c-fr-01-0017" num="0017">
<claim-text>Un dispositif de codage pour utilisation dans l'extraction d'un motif caché contenu dans une représentation tramée binaire d'un autre motif visible, dans lequel ladite représentation tramée est créée par le procédé de la revendication 1, le dispositif de décodage comprenant:
<claim-text>- un corrélateur spatial bidimensionnel pour traiter des donnée d'entrée qui sont représentatives de la représentation tramée binaire au moyen d'un<!-- EPO <DP n="37"> --> filtre spatial sous forme de ladite fonction clé, de sorte que l'image cachée est obtenue dans un plan de sortie du corrélateur sous forme d'une fonction de corrélation entre la représentation tramée binaire affichée dans un plan d'entrée dudit corrélateur et une fonction de référence prédéterminée en relation avec ladite fonction clé, grâce à ladite transformation spatiale,.</claim-text></claim-text></claim>
<claim id="c-fr-01-0018" num="0018">
<claim-text>Le dispositif selon la revendication 17, dans lequel le corrélateur bidimensionnel est un assemblage optique.</claim-text></claim>
<claim id="c-fr-01-0019" num="0019">
<claim-text>Le dispositif selon la revendication 18, dans lequel ledit assemblage optique comprend deux lentilles de la même focale <i>f</i> espacées l'une de l'autre d'une distance 2f, et un masque de filtrage à phase uniquement, présentant ladite fonction clé, située au niveau d'un plan central entre les lentilles.</claim-text></claim>
<claim id="c-fr-01-0020" num="0020">
<claim-text>Le dispositif selon la revendication 17, comprenant également un utilitaire de lecture de données susceptible d'être appliqué à ladite représentation tramée afin de produire lesdites données indicatives de cette dernière.</claim-text></claim>
<claim id="c-fr-01-0021" num="0021">
<claim-text>Le dispositif selon la revendication 20, dans lequel ledit utilitaire de lecture de données comprend un modulateur spatial de la lumière.</claim-text></claim>
<claim id="c-fr-01-0022" num="0022">
<claim-text>Un élément portant une représentation tramée binaire d'un premier motif visible qui comprend des données représentatives d'un deuxième motif caché, chaque cellule de ladite représentation tramée binaire présentant une répartition de la position des points de trame qui correspond à la répartition en niveaux de grilles dudit deuxième motif, permettant ainsi un traitement de ladite représentation tramée binaire afin d'extraire des données représentatives dudit deuxième motif caché au moyen d'un corrélateur. spatial bidimensionnel basé sur une fonction clé prédéterminée utilisée pour créer ladite représentation tramée binaire.</claim-text></claim>
<claim id="c-fr-01-0023" num="0023">
<claim-text>Un système d'identification d'un élément pour identifier un motif caché contenu dans une représentation tramée binaire d'un premier motif visible, le système comprenant le dispositif de décodage de la revendication 17.</claim-text></claim>
</claims><!-- EPO <DP n="38"> -->
<drawings id="draw" lang="en">
<figure id="f0001" num=""><img id="if0001" file="imgf0001.tif" wi="178" he="239" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="39"> -->
<figure id="f0002" num=""><img id="if0002" file="imgf0002.tif" wi="148" he="221" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="40"> -->
<figure id="f0003" num=""><img id="if0003" file="imgf0003.tif" wi="144" he="166" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="41"> -->
<figure id="f0004" num=""><img id="if0004" file="imgf0004.tif" wi="167" he="250" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="42"> -->
<figure id="f0005" num=""><img id="if0005" file="imgf0005.tif" wi="142" he="181" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="43"> -->
<figure id="f0006" num=""><img id="if0006" file="imgf0006.tif" wi="153" he="207" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="44"> -->
<figure id="f0007" num=""><img id="if0007" file="imgf0007.tif" wi="180" he="228" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="45"> -->
<figure id="f0008" num=""><img id="if0008" file="imgf0008.tif" wi="163" he="230" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="46"> -->
<figure id="f0009" num=""><img id="if0009" file="imgf0009.tif" wi="162" he="226" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="47"> -->
<figure id="f0010" num=""><img id="if0010" file="imgf0010.tif" wi="176" he="239" img-content="drawing" img-format="tif"/></figure>
</drawings>
</ep-patent-document>
